- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 166字
- 2021-07-02 12:16:38
Planning and reconnaissance
In the planning and reconnaissance phase, we define the scope of the penetration test. This initial phase requires a lot of planning, and you need to answer questions, such as:
- What is the scope of the pentest?
- What are the restricted URLs?
- What are the various subdomains in scope?
- Are there multiple applications hosted on the same domain in different folders?
- Are there any other platforms where this application is hosted (that is, mobile applications, web applications, desktop applications, and so on)
Once you have answered these questions, you will get some clarity on what is to be tested and what's not. Depending on whether it is a black box or a white box test, further enumeration takes places. In either of the cases, we will have to go ahead and discover all the files and folders of the application in scope and identify the endpoints. Later, in the next chapter, we will see how to discover new files and folders using Burp.
推薦閱讀
- Android應(yīng)用安全實(shí)戰(zhàn):Frida協(xié)議分析
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- SASE原理、架構(gòu)與實(shí)踐
- 數(shù)字身份與元宇宙信任治理
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- 特種木馬防御與檢測(cè)技術(shù)研究
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實(shí)踐
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- 網(wǎng)絡(luò)空間安全:管理者讀物
- 模糊測(cè)試:強(qiáng)制發(fā)掘安全漏洞的利器
- 網(wǎng)絡(luò)安全技術(shù)與實(shí)訓(xùn)(第4版)(微課版)
- 互聯(lián)網(wǎng)企業(yè)安全高級(jí)指南
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專(zhuān)供版)
- 信息內(nèi)容安全管理及應(yīng)用
- 數(shù)字銀行安全體系構(gòu)建